
Nmap Development mailing list archives
Re: EXPERT IPv6 network scaning
From: niteesh kumar <niteesh3 () gmail com>
Date: Mon, 9 Apr 2012 11:22:55 +0530
On Mon, Apr 9, 2012 at 8:34 AM, David Fifield <david () bamsoftware com> wrote:
On Mon, Apr 09, 2012 at 01:01:23AM +0200, Patrik Karlsson wrote:Thanx patrik for that great patch. but still i cannot see the scanningresult on screen though i could see the packets coming in wireshark.I amrunning ubuntu in Vmware. Can you please test it your system onceagain.Please find the new script attached which include patch given by Patrik and also some parameter changes that improve the resultfurther.NiteeshI've been working with Niteesh off list to iron out the last bugs andjustcommitted the latest version of the script r28418. Great work Niteesh!Thanks for your work guys. The NSE description is the same as for targets-ipv6-invalid-dst; looks like just an oversight. I'm getting this error: ~/nmap-git$ sudo ./nmap -6 --script=targets-ipv6-mld --script-args interface=br0 -e br0 --packet-trace -d Starting Nmap 5.61TEST5 ( http://nmap.org ) at 2012-04-08 20:01 PDT PORTS: Using top 1000 ports found open (TCP:1000, UDP:0, SCTP:0) --------------- Timing report --------------- hostgroups: min 1, max 100000 rtt-timeouts: init 1000, min 100, max 10000 max-scan-delay: TCP 1000, UDP 1000, SCTP 1000 parallelism: min 0, max 0 max-retries: 10, host-timeout: 0 min-rate: 0, max-rate: 0 --------------------------------------------- NSE: Loaded 1 scripts for scanning. NSE: Script Pre-scanning. NSE: Starting runlevel 1 (of 1) scan. NSE: Starting targets-ipv6-mld. Initiating NSE at 20:01 NSOCK (0.0380s) PCAP requested on device 'br0' with berkeley filter 'ip6[40:1] == 58' (promisc=0 snaplen=1500 to_ms=200) (IOD #1) NSOCK (0.0380s) PCAP created successfully on device 'br0' (pcap_desc=5 bsd_hack=0 to_valid=1 l3_offset=14) (IOD #1) NSOCK (0.1410s) Pcap read request from IOD #1 EID 13 NSOCK (0.1410s) Callback: READ-PCAP SUCCESS for EID 13 NSE: Error while parsing IPv6 extension headers. NSOCK (0.1410s) Pcap read request from IOD #1 EID 21 NSOCK (10.1410s) Callback: READ-PCAP TIMEOUT for EID 21 NSE: > | CLOSE NSE: Finished targets-ipv6-mld. NSE: Finished targets-ipv6-mld. Completed NSE at 20:01, 10.10s elapsed NSOCK (10.1410s) nsi_delete() (IOD #1) NSE: Script Post-scanning. NSE: Starting runlevel 1 (of 1) scan. Read from /home/david/nmap-git: nmap-services. WARNING: No targets were specified, so 0 hosts scanned. Nmap done: 0 IP addresses (0 hosts up) scanned in 10.15 seconds Raw packets sent: 0 (0B) | Rcvd: 0 (0B) NSOCK (10.1410s) nsi_delete() (IOD #1) Here's what tcpdump sees (just one packet): 20:03:31.628811 IP6 fe80::1e6f:65ff:feb6:cad3 > ff02::1: HBH ICMP6, multicast listener querymax resp delay: 0 addr: ::, length 24 0x0000: 6000 0000 0020 0001 fe80 0000 0000 0000 `............... 0x0010: 1e6f 65ff feb6 cad3 ff02 0000 0000 0000 .oe............. 0x0020: 0000 0000 0000 0001 3a00 0502 0000 0100 ........:....... 0x0030: 8200 322f 0000 0000 0000 0000 0000 0000 ..2/............ 0x0040: 0000 0000 0000 0000 ........ David Fifield
Patrix would you mind changing description to description = [[ Sends an MLD query with maximum response delay 0 to the to discover available hosts on the LAN. This works because hosts will respond to this probe with an MLD report packet and as maximum response delay is 0 nobody gets time to wait for others` report even in the same multicast group. ]] the script is working for me without error what about you Patrik? $sudo ./nmap -6 --script=targets-ipv6-mld --script-args interface=eth0 -e eth0 --packet-trace -d Starting Nmap 5.61TEST5 ( http://nmap.org ) at 2012-04-08 22:31 PDT PORTS: Using top 1000 ports found open (TCP:1000, UDP:0, SCTP:0) --------------- Timing report --------------- hostgroups: min 1, max 100000 rtt-timeouts: init 1000, min 100, max 10000 max-scan-delay: TCP 1000, UDP 1000, SCTP 1000 parallelism: min 0, max 0 max-retries: 10, host-timeout: 0 min-rate: 0, max-rate: 0 --------------------------------------------- NSE: Loaded 1 scripts for scanning. NSE: Script Pre-scanning. NSE: Starting runlevel 1 (of 1) scan. NSE: Starting targets-ipv6-mld. Initiating NSE at 22:31 NSOCK (0.0620s) PCAP requested on device 'eth0' with berkeley filter 'ip6[40:1] == 58' (promisc=0 snaplen=1500 to_ms=200) (IOD #1) NSOCK (0.0620s) PCAP created successfully on device 'eth0' (pcap_desc=6 bsd_hack=0 to_valid=1 l3_offset=14) (IOD #1) NSOCK (0.1150s) Pcap read request from IOD #1 EID 13 NSOCK (0.1150s) Callback: READ-PCAP SUCCESS for EID 13 NSE: Error while parsing IPv6 extension headers. NSOCK (0.1150s) Pcap read request from IOD #1 EID 21 NSOCK (0.1160s) Callback: READ-PCAP SUCCESS for EID 21 NSE: Error while parsing IPv6 extension headers. NSOCK (0.1180s) Pcap read request from IOD #1 EID 29 NSOCK (0.1180s) Callback: READ-PCAP SUCCESS for EID 29 NSE: Error while parsing IPv6 extension headers. NSOCK (0.1180s) Pcap read request from IOD #1 EID 37 NSOCK (0.1180s) Callback: READ-PCAP SUCCESS for EID 37 NSE: Error while parsing IPv6 extension headers. NSOCK (0.1180s) Pcap read request from IOD #1 EID 45 NSOCK (0.1180s) Callback: READ-PCAP SUCCESS for EID 45 NSE: Error while parsing IPv6 extension headers. NSOCK (0.1180s) Pcap read request from IOD #1 EID 53 NSOCK (0.1180s) Callback: READ-PCAP SUCCESS for EID 53 NSE: Error while parsing IPv6 extension headers. NSOCK (0.1180s) Pcap read request from IOD #1 EID 61 NSOCK (0.1180s) Callback: READ-PCAP SUCCESS for EID 61 NSE: Error while parsing IPv6 extension headers. NSOCK (0.1180s) Pcap read request from IOD #1 EID 69 NSOCK (0.1180s) Callback: READ-PCAP SUCCESS for EID 69 NSE: Error while parsing IPv6 extension headers. NSOCK (0.1190s) Pcap read request from IOD #1 EID 77 NSOCK (0.1190s) Callback: READ-PCAP SUCCESS for EID 77 NSE: Error while parsing IPv6 extension headers. NSOCK (0.1190s) Pcap read request from IOD #1 EID 85 NSOCK (0.1190s) Callback: READ-PCAP SUCCESS for EID 85 NSE: Error while parsing IPv6 extension headers. NSOCK (0.1190s) Pcap read request from IOD #1 EID 93 NSOCK (0.1190s) Callback: READ-PCAP SUCCESS for EID 93 NSE: Error while parsing IPv6 extension headers. NSOCK (0.1190s) Pcap read request from IOD #1 EID 101 NSOCK (0.1190s) Callback: READ-PCAP SUCCESS for EID 101 NSE: Error while parsing IPv6 extension headers. NSOCK (0.1190s) Pcap read request from IOD #1 EID 109 NSOCK (0.1190s) Callback: READ-PCAP SUCCESS for EID 109 NSE: Error while parsing IPv6 extension headers. NSOCK (0.1190s) Pcap read request from IOD #1 EID 117 NSOCK (0.1190s) Callback: READ-PCAP SUCCESS for EID 117 NSE: Error while parsing IPv6 extension headers. NSOCK (0.1190s) Pcap read request from IOD #1 EID 125 NSOCK (0.1190s) Callback: READ-PCAP SUCCESS for EID 125 NSE: Error while parsing IPv6 extension headers. NSOCK (0.1200s) Pcap read request from IOD #1 EID 133 NSOCK (0.1200s) Callback: READ-PCAP SUCCESS for EID 133 NSE: Error while parsing IPv6 extension headers. NSOCK (0.1200s) Pcap read request from IOD #1 EID 141 NSOCK (0.1200s) Callback: READ-PCAP SUCCESS for EID 141 NSE: Error while parsing IPv6 extension headers. NSOCK (0.1200s) Pcap read request from IOD #1 EID 149 NSOCK (0.1760s) Callback: READ-PCAP SUCCESS for EID 149 NSE: Error while parsing IPv6 extension headers. NSOCK (0.1760s) Pcap read request from IOD #1 EID 157 NSOCK (10.1810s) Callback: READ-PCAP TIMEOUT for EID 157 NSE: > | CLOSE NSE: Finished targets-ipv6-mld. NSE: Finished targets-ipv6-mld. Completed NSE at 22:32, 10.12s elapsed NSOCK (10.1820s) nsi_delete() (IOD #1) Pre-scan script results: | targets-ipv6-mld: | IP: fe80::b078:c639:b146:8102 MAC: 78:84:3c:f6:d3:74 IFACE: eth0 | IP: fe80::40cd:699b:f177:9c6e MAC: 00:26:22:d7:79:26 IFACE: eth0 | IP: fe80::545e:73:7f22:93c6 MAC: c8:2a:14:07:c8:3e IFACE: eth0 | IP: fe80::ccce:ce1e:75ab:1ecb MAC: 00:23:8b:d0:22:73 IFACE: eth0 | IP: fe80::5c02:72d5:8e4c:f9ae MAC: 78:84:3c:f4:16:a0 IFACE: eth0 | IP: fe80::18a0:ee96:32eb:2fa6 MAC: f0:de:f1:71:55:43 IFACE: eth0 | IP: fe80::29e2:1a15:99c8:4d39 MAC: 90:e6:ba:bc:d1:03 IFACE: eth0 | IP: fe80::10b5:3a10:3b62:d107 MAC: f0:de:f1:9f:52:ec IFACE: eth0 | IP: fe80::d413:fcc4:ed78:b4eb MAC: f0:4d:a2:58:d4:d4 IFACE: eth0 | IP: fe80::e064:b78b:19ac:1f47 MAC: 00:26:22:04:55:7a IFACE: eth0 | IP: fe80::5d0:f6d2:733:8a7 MAC: 54:42:49:f3:3c:ed IFACE: eth0 | IP: fe80::64d0:fa38:59ea:c1cb MAC: 54:42:49:05:24:58 IFACE: eth0 | IP: fe80::21ec:a135:a069:766d MAC: b8:ac:6f:59:fc:83 IFACE: eth0 | IP: fe80::d543:2918:1607:aa19 MAC: 10:1f:74:11:0a:00 IFACE: eth0 | IP: fe80::1564:d9c1:ba5f:336d MAC: 18:03:73:8a:d7:66 IFACE: eth0 | IP: fe80::6482:d4bd:9671:f36 MAC: 00:1d:92:55:b6:9d IFACE: eth0 | IP: fe80::f8f4:bec:450:f623 MAC: 00:16:d3:ff:d3:db IFACE: eth0 | |_ Use --script-args=newtargets to add the results as targets NSE: Script Post-scanning. NSE: Starting runlevel 1 (of 1) scan. Read from /home/niteesh/Desktop/nmap: nmap-services. WARNING: No targets were specified, so 0 hosts scanned. Nmap done: 0 IP addresses (0 hosts up) scanned in 10.27 seconds Raw packets sent: 0 (0B) | Rcvd: 0 (0B) NSOCK (10.1820s) nsi_delete() (IOD #1) -Niteesh _______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://seclists.org/nmap-dev/
Current thread:
- Re: EXPERT IPv6 network scaning niteesh kumar (Apr 06)
- Re: EXPERT IPv6 network scaning Patrik Karlsson (Apr 06)
- Re: EXPERT IPv6 network scaning niteesh kumar (Apr 06)
- Re: EXPERT IPv6 network scaning niteesh kumar (Apr 06)
- Re: EXPERT IPv6 network scaning Patrik Karlsson (Apr 08)
- Re: EXPERT IPv6 network scaning David Fifield (Apr 08)
- Re: EXPERT IPv6 network scaning niteesh kumar (Apr 08)
- Re: EXPERT IPv6 network scaning Patrik Karlsson (Apr 08)
- Re: EXPERT IPv6 network scaning David Fifield (Apr 08)
- Re: EXPERT IPv6 network scaning Patrik Karlsson (Apr 09)
- Re: EXPERT IPv6 network scaning niteesh kumar (Apr 09)
- Re: EXPERT IPv6 network scaning Patrik Karlsson (Apr 09)
- Re: EXPERT IPv6 network scaning niteesh kumar (Apr 10)
- Re: EXPERT IPv6 network scaning niteesh kumar (Apr 10)
- Re: EXPERT IPv6 network scaning David Fifield (Apr 10)
- Re: EXPERT IPv6 network scaning niteesh kumar (Apr 11)
- Re: EXPERT IPv6 network scaning David Fifield (Apr 11)
- Re: EXPERT IPv6 network scaning niteesh kumar (Apr 06)
- Re: EXPERT IPv6 network scaning Patrik Karlsson (Apr 06)